 APT is the most advanced
cyber threat in the security
landscape.
 Cyber actors are progressed to
the extent that they can counter
attack any kind of defensive
countermeasures.
 One such perilous attack that
intrudes into a system and
mines private data is advanced
persistent threat.
BREAK THE
CHAIN
7 P H A S E S O F A D VA N C E D P E R S I S T E N T T H R EAT S
PHASE 01
 The intruder researches the victim to
gain knowledge about vulnerability in
the organization and the IT
infrastructure.
 The attacker finds the right contact
information to target by spear-
phishing.
SURVEILLANCE
PHASE 02
• The intruder builds a payload that can be
transported to the targeted victim’s computer.
• Thus the vulnerability found in the
Surveillance phrase is exploited with a Trojan
packaged with a delivery system.
ARMAMENT
PHASE 03
 The intruder finds means to deliver
this weaponized payload to the
victim’s computer.
 The three most prevalent forms of
delivery are email, website and a
USB stick.
CARRIAGE
PHASE 04
• The intruder triggers the execution of this
weaponized payload and exploits vulnerabilities in
these files to trigger the execution of malicious
code.
MANIPULATION
PHASE 05
 The intruder gains easy access to the
targeted victim’s system by deploying a
malicious Trojan.
DEPLOYMENT
PHASE 06
• After gaining the access, the payload initiates the
connection with the intruder’s server, thereby
making it easier for the intruder to shadow the
compromised system and issue commands
through the network.
CONTROL
PHASE 07
 This is the final phase where the
intruder has everything to exfiltrate the
right confidential information,
compromise data integrity or
availability.
ACTION
THE GOAL OF INTRUSION MAY SIMPLY
BE TO GAIN ACCESS TO THE SECURED
SYSTEM OR NETWORK.
BUT APTS CAN SURVEY THE SYSTEM FOR
WEEKS, MONTHS OR EVEN YEARS TO TAKE
SMALL STEPS TO ACCOMPLISH THE MISSION.
HOW INSPIRISYS CAN HELP
YOUR ORGANIZATION TO
DEFEND AGAINST APT?
As an integral piece of an Adaptive
Defence strategy, our state-of-the-
art advanced persistent threat
protection solutions protect against
cyber-attacks with technologies
such as
FIREWALL
First Layer Of
Defence Against APT
WEB
APPLICATION
FIREWALL
Monitor And Block
Malicious Web Traffic
ANTIVIRUS
Detect And Prevent A
Wide Range Of APT
Malware, Trojans
And Viruses
INTRUSION
PREVENTION
SYSTEM
Detect Malicious
Activities In The
System And Prevent
Any Possible Intrusion
SANDBOX
Behaviour Analysis To
Protect Against APT
VIRTUAL
PRIVATE
NETWORK
Encrypted Connection
To Ensure Sensitive
Data Is Safely
Transmitted
ADVANCED
EMAIL
PROTECTION
Scan And Block APT
Malware In Emails
Inspirisys Anti-APT Solutions
Bolstered With Advanced
Persistent Tools Reinforced To
Close The Response Gap By
Detecting Malicious Activities
Faster.
TO LEARN MORE ABOUT ISL ANTI-APT SOLUTIONS
Reach Out To reachus@inspirisys.com
Thank You

More Related Content

PPTX
Detecting and mitigating cyber threats and attacks1
PPT
Windows network security
PDF
Apt zero day malware
PDF
Network Security Presentation
PPT
Tutorial 9 - Security on the Internet
 
PPTX
Network security and viruses
PPT
Network Security Chapter 7
PPT
Network management and security
Detecting and mitigating cyber threats and attacks1
Windows network security
Apt zero day malware
Network Security Presentation
Tutorial 9 - Security on the Internet
 
Network security and viruses
Network Security Chapter 7
Network management and security

What's hot (20)

PPTX
Cyber warfare
PPT
Counter Measures Of Virus
PPTX
Network security - Defense in Depth
PPTX
Protection from hacking attacks
PPTX
Basics of Network Security
PPTX
FireEye Engineering
PPTX
What is IT security[1]
PPTX
Mobile security
PDF
Network security chapter 1,2
PPTX
Cyber security
PPTX
23 network security threats pkg
PDF
UNDERSTANDING HACKING
PPT
Network Security
PPTX
Virus and its CounterMeasures -- Pruthvi Monarch
PPT
Network Security Threats and Solutions
PPT
Internet Security
PPTX
Mobile security
PPT
Network Security
PPTX
Ransomware: Can you protect against attacks?
PPTX
What is network security and Types
Cyber warfare
Counter Measures Of Virus
Network security - Defense in Depth
Protection from hacking attacks
Basics of Network Security
FireEye Engineering
What is IT security[1]
Mobile security
Network security chapter 1,2
Cyber security
23 network security threats pkg
UNDERSTANDING HACKING
Network Security
Virus and its CounterMeasures -- Pruthvi Monarch
Network Security Threats and Solutions
Internet Security
Mobile security
Network Security
Ransomware: Can you protect against attacks?
What is network security and Types
Ad

Similar to Break the chain - 7 phases of Advanced Persistent Threats (20)

PDF
Advanced Persistent Threats: How They Sneak In and Stay Hidden
PDF
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
PDF
Understanding Advanced Cybersecurity Threats for the In-House Counsel
PPTX
Understanding-and-Defending-Against-Advanced-Persistent-Threats-APT.pptx.pptx
PDF
2015-advanced-persistent-threat-awareness_whp_eng_1015
PDF
RSA: Security Analytics Architecture for APT
PDF
Advanced persistent threats(APT)
PPTX
Advanced Persistent Threats
PPTX
APT in the Financial Sector
PPTX
Common Techniques To Identify Advanced Persistent Threat (APT)
PDF
Cyber security series advanced persistent threats
PPTX
Understanding advanced persistent threats (APT)
PDF
Advanced Persistent Threats Cutting Through The Hype
PPTX
Advanced Persistent Threats (APTs) - Information Security Management
PPTX
Real World Defense Strategies for Targeted Endpoint Threats
PDF
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
PDF
Advanced Persistent Threats in Cybersecurity – Cyber Warfare
PPTX
Advanced persistent threat (apt)
PPTX
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
PDF
HCA 530, Week 2, Advanced persistent threat healthcare under attack
Advanced Persistent Threats: How They Sneak In and Stay Hidden
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Understanding Advanced Cybersecurity Threats for the In-House Counsel
Understanding-and-Defending-Against-Advanced-Persistent-Threats-APT.pptx.pptx
2015-advanced-persistent-threat-awareness_whp_eng_1015
RSA: Security Analytics Architecture for APT
Advanced persistent threats(APT)
Advanced Persistent Threats
APT in the Financial Sector
Common Techniques To Identify Advanced Persistent Threat (APT)
Cyber security series advanced persistent threats
Understanding advanced persistent threats (APT)
Advanced Persistent Threats Cutting Through The Hype
Advanced Persistent Threats (APTs) - Information Security Management
Real World Defense Strategies for Targeted Endpoint Threats
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Advanced Persistent Threats in Cybersecurity – Cyber Warfare
Advanced persistent threat (apt)
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
HCA 530, Week 2, Advanced persistent threat healthcare under attack
Ad

Recently uploaded (20)

PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PPTX
The various Industrial Revolutions .pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Five Habits of High-Impact Board Members
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Architecture types and enterprise applications.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
A comparative study of natural language inference in Swahili using monolingua...
DOCX
search engine optimization ppt fir known well about this
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
Modernising the Digital Integration Hub
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPTX
Tartificialntelligence_presentation.pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
The various Industrial Revolutions .pptx
Module 1.ppt Iot fundamentals and Architecture
CloudStack 4.21: First Look Webinar slides
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A novel scalable deep ensemble learning framework for big data classification...
Five Habits of High-Impact Board Members
Assigned Numbers - 2025 - Bluetooth® Document
Architecture types and enterprise applications.pdf
Chapter 5: Probability Theory and Statistics
Getting started with AI Agents and Multi-Agent Systems
A comparative study of natural language inference in Swahili using monolingua...
search engine optimization ppt fir known well about this
WOOl fibre morphology and structure.pdf for textiles
DP Operators-handbook-extract for the Mautical Institute
Modernising the Digital Integration Hub
NewMind AI Weekly Chronicles – August ’25 Week III
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Tartificialntelligence_presentation.pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...

Break the chain - 7 phases of Advanced Persistent Threats

  • 1.  APT is the most advanced cyber threat in the security landscape.  Cyber actors are progressed to the extent that they can counter attack any kind of defensive countermeasures.  One such perilous attack that intrudes into a system and mines private data is advanced persistent threat.
  • 2. BREAK THE CHAIN 7 P H A S E S O F A D VA N C E D P E R S I S T E N T T H R EAT S
  • 3. PHASE 01  The intruder researches the victim to gain knowledge about vulnerability in the organization and the IT infrastructure.  The attacker finds the right contact information to target by spear- phishing. SURVEILLANCE
  • 4. PHASE 02 • The intruder builds a payload that can be transported to the targeted victim’s computer. • Thus the vulnerability found in the Surveillance phrase is exploited with a Trojan packaged with a delivery system. ARMAMENT
  • 5. PHASE 03  The intruder finds means to deliver this weaponized payload to the victim’s computer.  The three most prevalent forms of delivery are email, website and a USB stick. CARRIAGE
  • 6. PHASE 04 • The intruder triggers the execution of this weaponized payload and exploits vulnerabilities in these files to trigger the execution of malicious code. MANIPULATION
  • 7. PHASE 05  The intruder gains easy access to the targeted victim’s system by deploying a malicious Trojan. DEPLOYMENT
  • 8. PHASE 06 • After gaining the access, the payload initiates the connection with the intruder’s server, thereby making it easier for the intruder to shadow the compromised system and issue commands through the network. CONTROL
  • 9. PHASE 07  This is the final phase where the intruder has everything to exfiltrate the right confidential information, compromise data integrity or availability. ACTION
  • 10. THE GOAL OF INTRUSION MAY SIMPLY BE TO GAIN ACCESS TO THE SECURED SYSTEM OR NETWORK.
  • 11. BUT APTS CAN SURVEY THE SYSTEM FOR WEEKS, MONTHS OR EVEN YEARS TO TAKE SMALL STEPS TO ACCOMPLISH THE MISSION.
  • 12. HOW INSPIRISYS CAN HELP YOUR ORGANIZATION TO DEFEND AGAINST APT? As an integral piece of an Adaptive Defence strategy, our state-of-the- art advanced persistent threat protection solutions protect against cyber-attacks with technologies such as
  • 15. ANTIVIRUS Detect And Prevent A Wide Range Of APT Malware, Trojans And Viruses
  • 16. INTRUSION PREVENTION SYSTEM Detect Malicious Activities In The System And Prevent Any Possible Intrusion
  • 18. VIRTUAL PRIVATE NETWORK Encrypted Connection To Ensure Sensitive Data Is Safely Transmitted
  • 20. Inspirisys Anti-APT Solutions Bolstered With Advanced Persistent Tools Reinforced To Close The Response Gap By Detecting Malicious Activities Faster.
  • 21. TO LEARN MORE ABOUT ISL ANTI-APT SOLUTIONS Reach Out To reachus@inspirisys.com Thank You